{"id":11432,"date":"2019-06-13T06:55:48","date_gmt":"2019-06-13T10:55:48","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=11432"},"modified":"2022-06-15T07:27:08","modified_gmt":"2022-06-15T11:27:08","slug":"different-methods-customer-identification-kyc","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/","title":{"rendered":"Different Methods of Customer Identification (KYC) and their Shortcomings"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The customer identification process is globally known as KYC, which stands for Know Your Customer or know your clients. It is the process of identification and authorization of the customer considering risk factors related to the business. KYC is generally practiced by banking and financial institutions as part of the regulation of general banking and anti-money laundering activities. However, some enterprises are also practicing KYC to control the risk factors and ensure the anti-bribery compliant assessment with their clients.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11433\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/05\/Different-Methods-of-Customer-Identificatio-and-their-Shortcomings.jpg\" alt=\"Different-Methods-of-Customer-Identificatio-and-their-Shortcomings\" width=\"800\" height=\"445\" \/><\/p>\n<h2><b>Alternatives of KYC Process<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In 2001, the banks in the US were mandated to maintain KYC to prevent money laundering. The process includes collecting the following documents from each client:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> \u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">National Identification Card<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">Passport<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">Social Security Number<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">PAN Card<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">These types of documents or information are mandatory for any form of KYC process worldwide nowadays. Let\u2019s have a look into the different methods used for KYC and their shortcomings:<\/span><\/p>\n<h3><b>Paper-Based KYC<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">From the very beginning, the process was practiced in the paper-based documentation system. This system required huge administrative costs and manpower. Moreover, the authority was continuing to find out the discrepancy in the financial statements and the investigation submitted the report that the people are using fake information for the KYC purpose.<\/span><\/p>\n<h3><b>Digital KYC<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Over a couple of years, digital KYC was introduced in the banking and financial sectors. This method uses a computer system to record all data of an individual to maintain a hassle-free and easy KYC process. Digital KYC is helping the industry to maintain accurate customer data, and regulatory requirements using a central system. But numerous issues like taking a long time for verification, troublesome API integration with the core system, prone to data breaches, and long queue because of ID verification are associated with this method.<\/span><\/p>\n<h3><b>Biometric Based KYC<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric verification is simple and convenient for the end users and the most secure method of identification. No one can use the biometrics of others and it is almost impossible to forge the biometric data. And the authentication process is very simple to comply with KYC requirements. It eliminates the difficulties of compliance, record keeping, and repetitive document scanning. At the same time, seamless integration enables this method to work with the core system.<\/span><\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web API for Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Features:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/ Finger-Vein\/ Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Blog&amp;utm_medium=Different+Methods+of+Customer+Identification+%28KYC%29+and+their+Shortcomings&amp;utm_campaign=Blog+Display+Ads\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<h2><b>Why Biometric KYC is Best?<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">There are numerous reasons like identification fraud, and sharing wrong information behind the adoption of biometrics for customer identification. Implementing biometrics in the banking industry for <a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-technology-from-m2sys-to-revolutionize-kyc-process-in-banking\/?utm_source=Blog&amp;utm_medium=Different+Methods+of+Customer+Identification+%28KYC%29+and+their+Shortcomings&amp;utm_campaign=Blog+Post\">effective KYC management<\/a> can eliminate the shortcomings of the other methods. The benefits of Biometric KYC are as below:<\/span><\/p>\n<h3><b>1. Accurate Identification:<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Customer identification is the main objective of the KYC process to forestall illicit fraudulent activity and money laundering. As biometric identification is the most secure way of authentication it eliminates the difficulties of identifying the right person and reduces the risk of the financial transaction.<\/span><\/p>\n<h3><b>2. Fastest Verification:<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Traditional paper-based or digital KYC process requires more time to verify the person matching their details from the file or computer system. Biometric technology authenticates the individual in less than a second and reduces the hassles of repetitive authentication.<\/span><\/p>\n<h3><b>3. Optimum Security:<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Protecting customer&#8217;s identities, and preventing identity theft the biometric KYC enables the banking institutions to reduce the transaction risk. The biometric authentication is the most sophisticated security system that ensures optimum security level, reducing the chances of being the victim of forged identification to almost zero.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In conclusion, it\u2019s your turn to decide which method you should go for? Traditional methods for customer identification or the biometric-based method? If we sum up the discussion, the best way to deploy a system for customer identification is the biometric KYC process which is accepted worldwide, and mandatory for sensitive institutions like the banks.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The customer identification process is globally known as KYC, which stands for Know Your Customer or know your clients. It<\/p>\n","protected":false},"author":403,"featured_media":15665,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Different Methods of Customer Identification","_yoast_wpseo_title":"%%title%%","_yoast_wpseo_metadesc":"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[930],"tags":[1289,1287,1224,1288],"class_list":["post-11432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-software","tag-best-kyc-process","tag-biometric-customer-identification","tag-biometric-kyc","tag-biometric-kyc-for-banking-and-financial-services"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Different Methods of Customer Identification (KYC) and their Shortcomings<\/title>\n<meta name=\"description\" content=\"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Different Methods of Customer Identification (KYC) and their Shortcomings\" \/>\n<meta property=\"og:description\" content=\"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T10:55:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-15T11:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/06\/Different-Methods-of-Customer-Identificatio-and-their-Shortcomings.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leonardo Sam Waterson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leonardo Sam Waterson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\"},\"author\":{\"name\":\"Leonardo Sam Waterson\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f\"},\"headline\":\"Different Methods of Customer Identification (KYC) and their Shortcomings\",\"datePublished\":\"2019-06-13T10:55:48+00:00\",\"dateModified\":\"2022-06-15T11:27:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\"},\"wordCount\":694,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"best kyc process\",\"Biometric customer identification\",\"biometric kyc\",\"biometric kyc for banking and financial services\"],\"articleSection\":[\"Biometric Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\",\"name\":\"Different Methods of Customer Identification (KYC) and their Shortcomings\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-06-13T10:55:48+00:00\",\"dateModified\":\"2022-06-15T11:27:08+00:00\",\"description\":\"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Different Methods of Customer Identification (KYC) and their Shortcomings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f\",\"name\":\"Leonardo Sam Waterson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"caption\":\"Leonardo Sam Waterson\"},\"description\":\"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Different Methods of Customer Identification (KYC) and their Shortcomings","description":"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/","og_locale":"en_US","og_type":"article","og_title":"Different Methods of Customer Identification (KYC) and their Shortcomings","og_description":"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-06-13T10:55:48+00:00","article_modified_time":"2022-06-15T11:27:08+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/06\/Different-Methods-of-Customer-Identificatio-and-their-Shortcomings.jpg","type":"image\/jpeg"}],"author":"Leonardo Sam Waterson","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Leonardo Sam Waterson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/"},"author":{"name":"Leonardo Sam Waterson","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f"},"headline":"Different Methods of Customer Identification (KYC) and their Shortcomings","datePublished":"2019-06-13T10:55:48+00:00","dateModified":"2022-06-15T11:27:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/"},"wordCount":694,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["best kyc process","Biometric customer identification","biometric kyc","biometric kyc for banking and financial services"],"articleSection":["Biometric Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/","name":"Different Methods of Customer Identification (KYC) and their Shortcomings","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-06-13T10:55:48+00:00","dateModified":"2022-06-15T11:27:08+00:00","description":"Biometrics is the best KYC process among different methods of customer identification to prevent identification fraud, and sharing wrong information.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/different-methods-customer-identification-kyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Different Methods of Customer Identification (KYC) and their Shortcomings"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f","name":"Leonardo Sam Waterson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","caption":"Leonardo Sam Waterson"},"description":"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11432"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/403"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=11432"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11432\/revisions"}],"predecessor-version":[{"id":17590,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11432\/revisions\/17590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15665"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=11432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=11432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=11432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}